From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mail.saout.de (Postfix) with ESMTP for ; Sun, 23 May 2010 16:27:48 +0200 (CEST) Received: from int-mx02.intmail.prod.int.phx2.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id o4NERkxo008282 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Sun, 23 May 2010 10:27:47 -0400 Message-ID: <4BF93B5B.3070907@redhat.com> Date: Sun, 23 May 2010 16:27:39 +0200 From: Milan Broz MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: [dm-crypt] [ANNOUNCE] cryptsetup 1.1.1 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt Cc: device-mapper development -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The stable cryptsetup 1.1.1 release is available at http://code.google.com/p/cryptsetup/ Feedback and bug reports are welcomed. Milan mbroz@redhat.com Cryptsetup 1.1.1 Release Notes ============================== Changes since version 1.1.1-rc2 * Fix luksClose error if underlying device is LVM logical volume. Changes since version 1.1.1-rc1 * Fix automatic dm-crypt module loading. Changes since version 1.1.0 Important changes: ~~~~~~~~~~~~~~~~~~ * Detects and use device-mapper udev support if available. This should allow synchronisation with udev rules and avoid races with udev. If package maintainer want to use old, direct libdevmapper device node creation, use configure option --disable-udev. * Supports device topology detection for data alignment. If kernel provides device topology ioctl calls, the LUKS data area alignment is automatically set to optimal value. This means that stacked devices (like LUKS over MD/LVM) should use the most optimal data alignment. (You can still overwrite this calculation using --align-payload option.) * Prefers some device paths in status display. (So status command will try to find top level device name, like /dev/sdb.) * Fix package config file to use proper package version. Other changes: ~~~~~~~~~~~~~~ * Fix luksOpen reading of passphrase on stdin (if "-" keyfile specified). * Fix isLuks to initialise crypto backend (blkid instead is suggested anyway). * Properly initialise crypto backend in header backup/restore commands. * Do not verify unlocking passphrase in luksAddKey command. * Allow no hash specification in plain device constructor - user can provide volume key directly. * Try to use pkgconfig for device mapper library in configuration script. * Add some compatibility checks and disable LUKS suspend/resume if not supported. * Rearrange tests, "make check" now run all available test for package. * Avoid class C++ keyword in library header. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkv5O1sACgkQf1Jlc7shgi9NWwCeLKDZVw50v/UURvmdAyb+vAJ/ r1gAn38pny0qkFgzD9FxBo9qWT2gi5qT =h4oU -----END PGP SIGNATURE-----